Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Published

    Using verifiable author data: Gender and spelling differences in Twitter and SMS

    Baron, A., Tagg, C., Rayson, P., Greenwood, P., Walkerdine, J. & Rashid, A., 06/2011. 0 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  2. Published

    Using underutilized CPU resources to enhance its reliability

    Timor, A., Mendelson, A., Birk, Y. & Suri, N., 1/01/2010, In: IEEE Transactions on Dependable and Secure Computing. 7, 1, p. 94-109 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    Using software defined networking to enhance the delivery of video-on-demand

    Georgopoulos, P., Broadbent, M., Farshad, A., Plattner, B. & Race, N., 15/09/2015, In: Computer Communications. 69, p. 79-87 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    Using quantum effects in nanomaterials for unique identification

    Young, R. J., Roberts, J. & Speed, P., 5/01/2016, In: SPIE Newsroom. 3 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    Using quantum confinement to uniquely identify devices

    Roberts, J., Bagci, I. E., Zawawi, M. A. M., Sexton, J., Hulbert, N., Noori, Y., Young, M., Woodhead, C., Missous, M., Migliorato, M. A., Roedig, U. & Young, R. J., 10/11/2015, In: Scientific Reports. 5, 8 p., 16456 .

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    Using NEMO to support the global reachability of MANET nodes.

    McCarthy, B., Edwards, C. & Dunmore, M., 04/2009, IEEE INFOCOM 2009. IEEE, p. 2097-2115 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Using NEMO to Extend the Functionality of MANETs.

    McCarthy, B., Edwards, C. & Dunmore, M., 05/2008, IEEE International Conference on Communications Workshops, 2008. ICC Workshops '08.. IEEE, p. 455-460 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  8. Published

    Using Evolving Fuzzy Models to predict Crude Oil Distillation Side Streams

    Macias-Hernandez, J. J., Angelov, P. & Zhou, X., 2011, Computer-Aided Design, Manufacturing, Modeling and Simulation . He, X., Hua, E., Lin, Y. & Liu, X. (eds.). Zurich: Trans-Tech Publications, p. 432-437 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Using DSML for Handling Multi-tenant Evolution in Cloud Applications

    Jumagaliyev, A., Whittle, J. N. D. & Elkhatib, Y., 11/12/2017, Cloud Computing Technology and Science (CloudCom), 2017 IEEE International Conference on. IEEE, p. 272-279 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Using Design Fiction to Inform Shape-Changing Interface Design and Use

    Sturdee, M., Coulton, P. & Alexander, J. M., 6/09/2017, In: The Design Journal. 20, Suppl. 1, p. S4146-S4157 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Previous 1...5 6 7 8 9 10 11 12 ...255 Next

Back to top